際際滷shows by User: max_ott / http://www.slideshare.net/images/logo.gif 際際滷shows by User: max_ott / Wed, 10 May 2017 01:19:42 GMT 際際滷Share feed for 際際滷shows by User: max_ott The Right Data to the Right People the Right Way /slideshow/the-right-data-to-the-right-people-the-right-way/75834981 20170509publicsectordata-170510011942
This are slides for a talk I gave at Australian Public Sector Data & Analytics Roadshow. It gives a high-level overview of the challenges faced by government agencies to achieve better outcomes through the use of data. Specifically I was highlighting the interdependencies of utility, privacy and access and briefly discussed some of the technologies we are developing to lessen the currently tight bounds between those three elements to ensure that we can put more data into the hands of more people without sacrificing privacy.]]>

This are slides for a talk I gave at Australian Public Sector Data & Analytics Roadshow. It gives a high-level overview of the challenges faced by government agencies to achieve better outcomes through the use of data. Specifically I was highlighting the interdependencies of utility, privacy and access and briefly discussed some of the technologies we are developing to lessen the currently tight bounds between those three elements to ensure that we can put more data into the hands of more people without sacrificing privacy.]]>
Wed, 10 May 2017 01:19:42 GMT /slideshow/the-right-data-to-the-right-people-the-right-way/75834981 max_ott@slideshare.net(max_ott) The Right Data to the Right People the Right Way max_ott This are slides for a talk I gave at Australian Public Sector Data & Analytics Roadshow. It gives a high-level overview of the challenges faced by government agencies to achieve better outcomes through the use of data. Specifically I was highlighting the interdependencies of utility, privacy and access and briefly discussed some of the technologies we are developing to lessen the currently tight bounds between those three elements to ensure that we can put more data into the hands of more people without sacrificing privacy. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20170509publicsectordata-170510011942-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This are slides for a talk I gave at Australian Public Sector Data &amp; Analytics Roadshow. It gives a high-level overview of the challenges faced by government agencies to achieve better outcomes through the use of data. Specifically I was highlighting the interdependencies of utility, privacy and access and briefly discussed some of the technologies we are developing to lessen the currently tight bounds between those three elements to ensure that we can put more data into the hands of more people without sacrificing privacy.
The Right Data to the Right People the Right Way from Maximilian Ott
]]>
344 3 https://cdn.slidesharecdn.com/ss_thumbnails/20170509publicsectordata-170510011942-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Confidential Computing - Analysing Data Without Seeing Data /slideshow/confidential-computing-analysing-data-without-seeing-data/68571733 dataanalyticswithoutseeingthedata-nov2016-161110094503
How can people collaborate over data analysis without disclosing their data to each other? This seminar will cover an end-to-end solution to this problem, including privacy preserving entity resolution and the application of partial homomorphic encryption and Rademacher observations to private linear classification tasks. In particular we will show that it is possible to learn from data, while keeping the data confidential, both with and without the entity resolution step. We will give a brief overview of potential applications and give some practical examples of how these approaches can be used.]]>

How can people collaborate over data analysis without disclosing their data to each other? This seminar will cover an end-to-end solution to this problem, including privacy preserving entity resolution and the application of partial homomorphic encryption and Rademacher observations to private linear classification tasks. In particular we will show that it is possible to learn from data, while keeping the data confidential, both with and without the entity resolution step. We will give a brief overview of potential applications and give some practical examples of how these approaches can be used.]]>
Thu, 10 Nov 2016 09:45:03 GMT /slideshow/confidential-computing-analysing-data-without-seeing-data/68571733 max_ott@slideshare.net(max_ott) Confidential Computing - Analysing Data Without Seeing Data max_ott How can people collaborate over data analysis without disclosing their data to each other? This seminar will cover an end-to-end solution to this problem, including privacy preserving entity resolution and the application of partial homomorphic encryption and Rademacher observations to private linear classification tasks. In particular we will show that it is possible to learn from data, while keeping the data confidential, both with and without the entity resolution step. We will give a brief overview of potential applications and give some practical examples of how these approaches can be used. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dataanalyticswithoutseeingthedata-nov2016-161110094503-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How can people collaborate over data analysis without disclosing their data to each other? This seminar will cover an end-to-end solution to this problem, including privacy preserving entity resolution and the application of partial homomorphic encryption and Rademacher observations to private linear classification tasks. In particular we will show that it is possible to learn from data, while keeping the data confidential, both with and without the entity resolution step. We will give a brief overview of potential applications and give some practical examples of how these approaches can be used.
Confidential Computing - Analysing Data Without Seeing Data from Maximilian Ott
]]>
965 5 https://cdn.slidesharecdn.com/ss_thumbnails/dataanalyticswithoutseeingthedata-nov2016-161110094503-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mobile Operators: From Packet Delivery to Content Logistics /slideshow/lte-a-workshop-brazil-nov-2013/29023032 lte-aworkshopbrazil-nov2013-131208212311-phpapp01
Video is THE dominating traffic source on mobile networks. Mobile operators need to address that through innovative new services. The talk proposes to move from a dumb packet delivery service to Content Logistics. It describes a new technical approach & business model to tackle that ]]>

Video is THE dominating traffic source on mobile networks. Mobile operators need to address that through innovative new services. The talk proposes to move from a dumb packet delivery service to Content Logistics. It describes a new technical approach & business model to tackle that ]]>
Sun, 08 Dec 2013 21:23:11 GMT /slideshow/lte-a-workshop-brazil-nov-2013/29023032 max_ott@slideshare.net(max_ott) Mobile Operators: From Packet Delivery to Content Logistics max_ott Video is THE dominating traffic source on mobile networks. Mobile operators need to address that through innovative new services. The talk proposes to move from a dumb packet delivery service to Content Logistics. It describes a new technical approach & business model to tackle that <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/lte-aworkshopbrazil-nov2013-131208212311-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Video is THE dominating traffic source on mobile networks. Mobile operators need to address that through innovative new services. The talk proposes to move from a dumb packet delivery service to Content Logistics. It describes a new technical approach &amp; business model to tackle that
Mobile Operators: From Packet Delivery to Content Logistics from Maximilian Ott
]]>
433 3 https://cdn.slidesharecdn.com/ss_thumbnails/lte-aworkshopbrazil-nov2013-131208212311-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-max_ott-48x48.jpg?cb=1523520812 au.linkedin.com/pub/maximilian-ott/7/571/b14/ https://cdn.slidesharecdn.com/ss_thumbnails/20170509publicsectordata-170510011942-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/the-right-data-to-the-right-people-the-right-way/75834981 The Right Data to the ... https://cdn.slidesharecdn.com/ss_thumbnails/dataanalyticswithoutseeingthedata-nov2016-161110094503-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/confidential-computing-analysing-data-without-seeing-data/68571733 Confidential Computing... https://cdn.slidesharecdn.com/ss_thumbnails/lte-aworkshopbrazil-nov2013-131208212311-phpapp01-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/lte-a-workshop-brazil-nov-2013/29023032 Mobile Operators: From...